include/linux/bpf-cgroup.h
0 → 100644
+79
−0
+12
−0
+1
−0
kernel/bpf/cgroup.c
0 → 100644
+167
−0
Loading
Donate to e Foundation | Murena handsets with /e/OS | Own a part of Murena! Learn more
This patch adds two sets of eBPF program pointers to struct cgroup.
One for such that are directly pinned to a cgroup, and one for such
that are effective for it.
To illustrate the logic behind that, assume the following example
cgroup hierarchy.
A - B - C
\ D - E
If only B has a program attached, it will be effective for B, C, D
and E. If D then attaches a program itself, that will be effective for
both D and E, and the program in B will only affect B and C. Only one
program of a given type is effective for a cgroup.
Attaching and detaching programs will be done through the bpf(2)
syscall. For now, ingress and egress inet socket filtering are the
only supported use-cases.
Signed-off-by:
Daniel Mack <daniel@zonque.org>
Acked-by:
Alexei Starovoitov <ast@kernel.org>
Signed-off-by:
David S. Miller <davem@davemloft.net>